TCP Congestion Control Scheme for Wireless Networks based on TCP Reserved Field and SNR Ratio

Size: px
Start display at page:

Download "TCP Congestion Control Scheme for Wireless Networks based on TCP Reserved Field and SNR Ratio"

Transcription

1 TCP Congestion Control Scheme for Wireless Networks based on TCP Reserved Field and SNR Ratio Youssef Bassil LACSC Lebanese Association for Computational Sciences, Registered under No. 957, 2011, Beirut, Lebanon Abstract Currently, TCP is the most popular and widely used network transmission protocol. In actual fact, about 90% of connections on the internet use TCP to communicate. Through several upgrades and improvements, TCP became well optimized for the very reliable wired networks. As a result, TCP considers all packet timeouts in wired networks as due to network congestion and not to bit errors. However, with networking becoming more heterogeneous, providing wired as well as wireless topologies, TCP suffers from performance degradation over error-prone wireless links as it has no mechanism to differentiate error losses from congestion losses. It therefore considers all packet losses as due to congestion and consequently reduces the burst of packet, diminishing at the same time the network throughput. This paper proposes a new TCP congestion control scheme appropriate for wireless as well as wired networks and is capable of distinguishing congestion losses from error losses. The proposed scheme is based on using the reserved field of the TCP header to indicate whether the established connection is over a wired or a wireless link. Additionally, the proposed scheme leverages the SNR ratio to detect the reliability of the link and decide whether to reduce packet burst or retransmit a timed-out packet. Experiments conducted, revealed that the proposed scheme proved to behave correctly in situations where timeouts were due to error and not to congestion. Future work can improve upon the proposed scheme so much so that it can leverage CRC and HEC errors so as to better determine the cause of transmission timeouts in wireless networks. Keywords TCP Congestion, Wireless Network, Reserved Field, SNR 1. Introduction When the number of packets sent to any network is more than it can handle, congestion develops [1]. Numerous algorithms have been developed since the dawn of computer networking to deal with network congestion. In fact, the simplest way to solve congestion is to employ the principle of packet conversation in which the sender stops sending a new packet until the previous one is successfully delivered to the receiver. For this reason, the TCP protocol, one of the core protocols of the Internet protocol suite, employs the concept of congestion control which dynamically controls the flow of packet inside a network, and prevents network performance collapse [2]. In the early days of data communication, the problem was how to detect congestion because not receiving an acknowledgment from the receiver (referred to as timeout) does not mean that the packet was lost due to congestion but also to noise or error in the transmission wire. However, with the advancement of technologies, packet loss due to transmission error became relatively infrequent as most communication trunks and network infrastructures achieved a high-level of reliability and resilience. As a result, transmission timeouts in modern computer wired networks are 99% due to congestion [3]. The reliability of data transmission has led the TCP protocol to be optimized for wired networks in a sense that any packet loss is considered to be the result of network congestion and not the result of network errors. Algorithmically, when a timeout is detected, the TCP congestion control algorithm reduces dramatically the packet burst to diminish the network load and relieve the congestion. In effect, the TCP congestion algorithm cannot differentiate the loss caused by congestion from the one caused by error. Once a loss occurs, TCP deals with that as a congestion event and halves down the size of its congestion window. This unnecessary slowdown reaction decreases the throughput of TCP and reduces the overall speed of the network. In practice, the aforementioned behavior of the TCP congestion algorithm is acceptable in wired networks as packet timeouts are most of the time caused by congestion. However, this is totally inappropriate in wireless networks as wireless links are known to experience a lot error bits and packet loss due to fading, interference, hand-off, and other radio effects; consequently, packet loss in wireless networks cannot be considered as due to congestion. As a result, the TCP often makes the wrong decision by slowing down the burst of packets while it should instead retransmit lost packets. This problem is popularly known as the TCP performance problem over wireless network and has been researched and studied by many researchers for many years now [4]. The key in solving this problem is to allow TCP to differentiate between timeouts caused by congestion and those caused by errors and noise in the wireless channel. This paper proposes a new TCP congestion control scheme suitable for wireless as well as wired networks and is intended to distinguish congestion losses from error losses. The proposed scheme is based on using the reserved bits of the TCP header to indicate whether the established connection is over a wired or a wireless link. Moreover, the scheme harnesses the SNR (Signal-to-Noise) ratio to detect the reliability of the link and decide whether to reduce packet burst or retransmit a timed-out packet. In brief, when a timeout occurs, the TCP protocol checks the type of the link,

2 if it is wired, then packet loss is due to congestion so the classical slow-start congestion control algorithm is executed to decrease the size of the congestion window. On the other hand, if the link is wireless and SNR ratio is less than 5dB, then packet loss is due to error and thus the timed-out packet is retransmitted leaving the congestion window intact. If the link is wireless and SNR ratio is greater than 5dB, then packet loss is due to congestion so the size of the congestion window is reduced to slow down the burst of packets. 2. TCP Congestion Control Algorithm TCP short for Transmission Control Protocol is the most dominant protocol used in computer networking and on the Internet. Characteristically, TCP encompasses various features, one of them is congestion control. In TCP, when a connection is established between a sender and a receiver, an appropriate window size must be selected. Actually, there exist two windows: the receiver s window and the sender s congestion window. The number of bytes that can be transmitted by the sender is the minimum of these two windows. Hence, in case the receiver s window size is 16 KB, and the sender s congestion window is 8 KB, then the transmission would occur at 8 KB. In contrast, if the receiver s window size is 8 KB and the sender s congestion window is 16 KB, then the transmission would occur at 8 KB. The sender calculates its congestion window size by inspecting the property of the medium network such as delays, traffic, and bandwidth; whereas, the receiver calculates its window size based on its buffer size. When a TCP connection is established, the sender initializes the congestion window to the size of the maximum segment available on the connection. It then sends one single maximum segment n. If this segment is acknowledged by the receiver before times out, the sender adds another segment doubling the size of its congestion window and sends the two segments 2n. As each of these segments is acknowledged by the receiver, the congestion window is increased by one maximum segment doubling its previous size. Basically, each acknowledged burst doubles the congestion window until either a timeout occurs or the size of the receiver s congestion window is reached. In case of a timeout, the segment size is decreased by half and so for the congestion window. The idea behind this behavior is to maintain, for instance, a window size of 4 KB as long as it is acknowledged by the receiver. Once, it gives a timeout, it is dropped to 2 KB to avoid congestion [5, 6]. Figure 1 is an example of the TCP congestion algorithm. 3. Problem Statement - TCP over Wireless Network Currently, all implementations of the TCP congestion algorithm assume that timeouts are caused by congestion, and not by transmission errors. This notion stands when applied to wired networks as they are relatively reliable and exhibit very low or no bit errors. However, this notion does not stand for wireless links as they suffer from high error and packet loss rates; and thus, they are still considered significantly unreliable. For this reason, any packet loss in wireless transmission is falsely considered by the TCP protocol as due to congestion which triggers the congestion algorithm to reduce the window size to one segment and consequently reducing transmission speed and packet throughput. For instance, if 25% of all packets are lost, then when the sender transmits 200 packets per second, the throughput is 150 packets per second. If the sender slows down to 100 packets per second, the throughput drops to 75 packets per second [7]. As the TCP congestion algorithm was not initially designed to support the error-prone wireless network, but the very reliable wired network, it is impossible for the sender to differentiate between congestion loss and error loss. As a result, in timeout situations over wireless networks, the TCP often makes the wrong decision by slowing down the burst of packets while it should instead retransmit lost packets. 4. Related Work Several schemes and approaches were extensively studied and experimented to solve the TCP congestion problem over wireless networks. Some of the most successful ones are: I- TCP, Snoop, ECN, WTCP, Westwood, TCP Vegas, TCP Veno, M-TCP, and JTCP I-TCP The Indirect-TCP (I-TCP) [8] is a modification of the original TCP protocol in which the network connection between sender and receiver is divided into two parts: Wired connection using the standard TCP and wireless connection using a modified version of the TCP. Wired connection is between the fixed host and a middleware station called proxy; while, wireless connection is between the proxy and the mobile hosts. The novelty of this approach is that errors from the wireless connection are corrected at the TCP proxy and do not propagate through the fixed network. The drawback of I-TCP is that it violates TCP s end-to-end semantics and introduces extra overhead as packets are processed twice, one time between the fixed host and the proxy and another time between the proxy and the mobile host. Figure 2 depicts the I-TCP architecture. Figure 1. Example of the TCP Congestion Algorithm

3 Figure 2. Indirect-TCP Architecture then the lost packet event is caused by congestion; otherwise, i.e. ECN bits are set to false, the lost packet event is caused by bit error. Although this scheme can determine the cause of loss exactly, it must be implemented inside the TCP protocol as well as network devices such as routers, switches, and stations. Figure 3 shows an ECN example in which several packets are dropped due to congestion. These packets are obviously marked in red denoting that the ECN bits are set to true Snoop Snoop [9] is a classic hiding non-congestion loss method in which a Snoop agent is employed between the wired and the wireless network. When the Snoop agent receives a packet from the wired network, it caches it into an internal buffer and then forwards it to the mobile host. The agent will afterwards wait for acknowledgment from the mobile host. When the agent receives the acknowledgment, it checks the status of the packet, if it is in the cache, then the lost packet is retransmitted to the destination without going back through the wired network; otherwise, the Snoop agent forwards the acknowledgment to the wired source denoting a congestion problem. The main drawbacks of Snoop are that it is not endto-end semantic and it does not completely isolate wireless link errors from the fixed network M-TCP M-TCP (Multicast TCP) [10] is intended for low bit-rate wireless links. In this scheme, every TCP connection is divided in two segments: The first is a TCP connection from the sender fixed host (FH) to the supervisor host (SH) and it uses the standard TCP protocol. The second connection is between the supervisor host (SH) and the mobile host (MH) and it uses an adapted version of TCP. In action, the FH sends a segment to MH, the SH receives it first then forwards it to the MH which acknowledges it upon receipt. Once SH receives the ACK from the receiver, it forwards it to the FH. In case the MH is disconnected, the SH stops receiving the ACK and considers that the MH has been temporarily disconnected and therefore it sends the ACK to the FH containing the window size of 0. The sender then freezes its timers and sends the backed-off persist packet to the SH which in turn responds with a zero window size until it receives some non-zero window size. As soon as the window size gets larger than zero, the SH directly replies with the suitable window size and restarts all its frozen timers. As a result, the sender resumes transmitting at full-speed ECN and Congestion Coherence ECN short for Explicit Congestion Notification [11] is a network congestion scheme that utilizes two bits in the IP header and two bits in the TCP header to record the status of the network. In case of congestion, the ECN bits are set to true in the last transmitted packet. When the receiver receives the packet with ECN set to true, it sets the ECN bits of the acknowledgment packet to true and sends it to the sender. The sender then reduces its window size to avoid congestion. Congestion coherence (CC) [12] is an improvement over ECN to differentiate loss. In case the ECN bits are set to true, Figure 3. ECN Example 4.5. WTCP WTCP (Wireless TCP) [13] is an end-to-end semantic mechanism able to distinguish error losses from congestion losses by comparing the packet arrival time with the packet departure time. WTCP is a replacement for the TCP protocol which, unlike TCP, does not half down its transmission rate for a packet loss but uses inter-packet delay as a metric to compute the rate adaptation at the receiver s end; hence, predicting the cause of packet loss and probing the receiver to find out what packet has to be retransmitted. In that sense, WTCP uses rate-based instead of window-based transmission in which the sender does not decide which packet have to be retransmitted but uses feedback from the receiver to do so. The major drawback of WTCP is that it is completely independent of the original TCP; and thus, it must be implemented by all network nodes and devices Westwood TCP Westwood [14] distinguishes the cause of packet loss by guessing the available bottleneck bandwidth. It measures the arrival rate of ACKs and uses the interval of constant feedback ACKs and the packet size to find the optimal network capacity denoted by SBW[j]. Additionally, it calculates a smoothed value denoted by BWE[j], by low-pass filtering the sequence of SBW[j]. SBW[j] = packet_size / (current_time prev_ack_time) BWE[j] = (1 - t) * (SBW[j] + SBW[j-1]) / 2 + t * BWE[j-1] Where packet_size is the size of packet, current_time is the most recent time, prev_ack_time is the time of the last ACK, and t is the factor of the low-pass filtering operation. Though Westwood tries to approximate the bandwidth of the connection to best find the congestion window size, it sometimes overestimates the available bandwidth making the overall throughput of the wireless network relatively slow TCP Vegas and TCP Veno TCP Vegas [15] estimates the capacity of the TCP link by finding the minimum RTT value called BaseRTT. The capacity of the backlog queue is calculated by the following equations:

4 Expected = cwnd / BaseRTT Actual = cwnd / ActualRTT Diff = Expected Actual ActualRTT = BaseRTT + N / Actual N = Actual * (ActualRTT - BaseRTT) = Diff * BaseRTT Where Expected is the expected rate of a wireless link, Actual is the actual rate, ActualRTT is the real RTT, cwnd is the current TCP congestion window size, and N is the size of the queue. The Vegas scheme tries to keep N as small as possible by fine-tuning the TCP window size ahead of time; thus, preventing packet loss caused by congestion. On the other hand, TCP Veno [16] improves upon Vegas to judge the cause of loss. It sets a threshold denoted by thres, to represent the status of the network. If packet loss occurs and N>thres, then the connection is said to be in bad status and the packet will be considered as congestion loss; otherwise, it will be considered as error loss. The disadvantages of TCP Vegas/Veno are that it constantly updates the window size leading to a performance overhead. In addition, it can lead to fluctuation in the window size and round trip times; and consequently, causing delay jitter and inefficient bandwidth utilization JTCP JTCP [17] short for Jitter TCP is a TCP congestion scheme used to detect packet loss and identify whether they are caused by congestion or bit error. It is based on the jitter ratio and packet-by-packet delay that are determined by the inter-arrival jitter i.e. the packet spacing at the sender compared with the packet spacing at the receiver for a pair of packets. The inter-arrival jitter can be calculated as follows: Where i and j denote the index of packet, S i denotes the sending time for packet i, and R i denotes the receiving time for packet i. JTCP can infer the packet with longer transmitted time and delays it into the router queue until congestion is resolved. JTCP has better performance than other congestion mechanisms; however, it is required to be implemented in the transport portion of the TCP stack at every endpoint, in addition to network devices, stations, and nodes. 5. Proposed Solution This paper proposes a TCP congestion control scheme suitable for wireless as well as wired network environments. It is based on using one single bit of the reserved bits of the TCP header to indicate the type of the link over which a connection is established. If the link is wired, the TCP reserved bit is set to 0 denoting a wired mode; whereas, if the link is wireless, the bit is set to 1 denoting a wireless mode. Additionally, the scheme uses the SNR (Signal-to-Noise) ratio to detect the reliability of the link. In wired mode, any timeout is considered a congestion loss; and thus, congestion is avoided by using the classical TCP start-slow algorithm. However, in wireless mode, two scenarios are possible for a packet timeout, both of which are based on SNR ratio: In case SNR is high, i.e., greater than 5dB, that means that the link is reliable and the loss is due to congestion, so the classical TCP congestion mechanism is executed to slow down the burst of packets. In case SNR is low, i.e., less than 5dB, that means that the link is unreliable and the loss is due to error, so the timed-out packet is retransmitted by the sender The Reserved Bits Transmission Control Protocol or TCP for short is one of the core protocols in the internet protocol suite. Its major role is to provide reliable and ordered delivery of data stream from an application on one computer to another application on another computer [18]. TCP is part of the transport layer which receives a data stream from the application layer for processing. The stream is segmented into small portions called packets, and appended to a TCP header creating a TCP segment. A TCP segment is made out of a header and a data section. The header section consists of 10 compulsory fields, and an optional extension field; while, the data section trails the header and carries the payload data for the application. The TCP header contains several fields; the source port, destination port, sequence number, data offset, flags, and checksum are few to mention. One overlooked field is the reserved field which is composed of three bits that are reserved by the original TCP design for future use. In modern TCP implementations, these bits are never used and should be set to zero. The proposed scheme exploits this reserved field to detect the type of the link over which the connection is established. In fact, only the first bit is used which can be either set to 0 to indicate a wired communication or to 1 to indicate a wireless communication. This mechanism must be implemented in the TCP stack of every network device including operating system, switches, routers, and stations so that packets are marked as wired or wireless. Figure 4 depicts the original TCP header format along with the reserved bits leveraged by the proposed TCP congestion scheme. Figure 4. TCP Header with Reserved Bits 5.2. The Congestion Algorithm In digital communication, a signal-to-noise ratio (often abbreviated as SNR) is a measure used to compare the level of a desired signal to the level of background noise [19]. Higher numbers are better. The lower limit of SNR is usually considered to be around 5dB, while 12dB is fairly enough for most conditions. In practice, the SNR ratio is detected upon the initial communication session setup phase. Generally, low SNR leads to high bit and CRC error rate causing packet loss and timeouts. Mathematically, SNR is defined as the ratio of signal power to the noise power, and it can be calculated using the equation below.

5 Often SNR is expressed in decibel units according to the following equation: The proposed scheme when operating in wireless mode exploits the SNR ratio of the communication line to decide whether a timed-out packet was due to congestion or error loss. When a TCP connection first begins, the congestion algorithm initializes the congestion window cwnd to one segment. Then, the first bit of the reserved field is set according to the type of the link, i.e., b=0 for wired and b=1 for wireless connection. Packets are then sent to the receiver. When they are successfully acknowledged, the congestion window cwnd is incremented by one segment, making its size two segments, then four segments, then eight segments, and so on doubling each time the window size until the size advertised by the receiver is reached or until congestion occurs. When congestion occurs, packets will start to be lost triggering a timeout at the sender. In this situation, the sender immediately checks the reserved bit b. If it is equal to 0 (wired link), then timeout is considered to be due to congestion. The size of the congestion window cwnd would be set to one half of the current size and the sender resumes the burst of packets. In contrast, if the reserved bit b is equal to 1 (wireless link), the SNR ratio of the connection is checked. In case it is within a high range, i.e., greater than 5dB (SNR>5dB), then timeout is considered to be due to congestion and the window size is halved by one segment and next packet is sent. However, if SNR ratio is within a low range, i.e., less than 5dB (SNR<5dB), then timeout is considered to be due to error and the timed-out packet is retransmitted to the receiver. The flowchart of the proposed congestion algorithm is depicted in Figure 5; while, its pseudo-code is outlined as follows: 1. Initialize congestion window cwnd to one segment. 2. Start sending packets to receiver. 3. For each acknowledgement received, increment congestion window cwnd by one segment. 4. If a timeout occurs for a particular packet p then check the value of the reserved bit b for packet p. 1. If b=0 (wired link), then set cwnd to half of its previous size (indicating a congestion) 2. Else if b=1 (wireless link), then check the SNR ratio of the link. 1. If SNR>5dB, then set cwnd to half of its previous size (indicating a congestion) 2. Else if SNR<5dB, then don t change the current size of cwnd, and retransmit packet p (indicating an error) Figure 5. Flowchart of the Proposed Congestion Algorithm 5.3. Advantages End-to-end semantics: The proposed scheme maintains true end-to-end semantics, without involving any intermediary between the sender and the receiver. Performance: The proposed scheme maintains a high level of performance especially that no intermediate nodes are involved which eliminates any extra processing overhead and the need for extra buffer space. No change in code: The proposed scheme maintains the source code of the sender and the receiver without the need to alter and recompile the communicating applications. Compatibility: The proposed scheme maintains the original TCP structure with one exception is the integration of the proposed congestion algorithm into the standard TCP RFC 793 stack so as to take advantage of the TCP reserved field and the SNR ratio of the underlying transmission link. 6. Simulation & Results As a proof of concept, the proposed scheme and the standard TCP (RFC 793) [20] were simulated using Network Simulator 3 (NS-3) [21]. For this purpose, a network model was built. It is a wireless topology network in which C is a client node, R1 is a router, and R is a receiver node. The bandwidth between C and R1 is 100Mbps with 5ms propagation time; while, bandwidth between R1 and R is 80Mbps with 2ms propagation time. The packet size is 1 KB

6 and the size of queue is 100. Figure 6 depicts the wireless network model to be simulated. Figure 6. Wireless Network Model The simulation was run for 350 seconds and two aspects were evaluated in presence of packet loss caused by error: The network throughput and the congestion window size. Figure 7 shows the simulation results for network throughput of the proposed scheme and the standard TCP protocol (RFC 793). Figure 8. Simulation Results for Window Size of TCP RFC 793 Figure 9. Simulation Results for Window Size of the Proposed Scheme Figure 7. Simulation Results for Network Throughput In the above results, the throughputs of both schemes are about the same for 0% packet loss rate. However, when the packet loss rate increased, the deviation became more visible. In fact, the throughput of the TCP RFC 793 dropped exponentially with the increase of packet loss; while, the proposed scheme retained a more stable throughput throughout the simulation. This can be explained by the fact that TCP RFC 793 halves down its window size each time a timeout occurs (unacknowledged packet due to congestion loss), leading to a decrease in network throughout. On the other hand, the proposed scheme can detect the rate of packet loss by finding the SNR ratio of the link and consequently decide whether to retransmit the packet or halve down the connection bandwidth. In the simulation, the packet loss was due to error and not to congestion. The high number of packet loss means a low SNR ratio. Therefore, the proposed scheme retransmitted timed-out packets rather than decreasing the window size and the connection bandwidth. Furthermore, the simulation was run for another 350 seconds to evaluate the congestion window size in presence of packet loss. Figure 8 and 9 show the simulation results for congestion window size of the proposed scheme and the standard TCP protocol (RFC 793). In the above results, as with the increase of execution time, the packet loss increased which led the TCP RFC 793 to consider the situation as congestion and started reducing the size of the congestion window. It first started at 140 bytes then it went down to somewhat close to 20 bytes. The consequences of this reduction are a lower throughput and a decrease in the connection speed. In contrast, as the proposed scheme can differentiate between packet loss due to congestion and the one due to error, the window size was maintained most of the time with little fluctuation that ranged between 140 and 100 bytes. This fluctuation in the window size was due to timed-out packets in presence of a high SNR ratio (SNR>5dB), indicating no error but network congestion. Nevertheless, the window size was maintained in the presence of timeouts that were due to low SNR ratio (SNR<5dB), indicating no congestion but network errors. 7. Conclusions & Future Work This paper presented a novel scheme for solving the TCP performance problem over wireless networks. Its aim is to allow the TCP protocol to distinguish between transmission timeouts due to congestion and those due to error. The scheme uses the TCP reserved field to identify the type of network over which communication is occurring, in addition to the SNR ratio to determine the reliability of the link so that better decision can be made regarding whether to reduce packet burst or retransmit a timed-out packet. Simulation of the proposed scheme clearly showed that it successfully

7 managed to determine the cause of packet loss in wireless networks and take the right decision in situations where timeouts were due to error and not to congestion, that is, retransmitting the timed-out packet instead of reducing the congestion window size and consequently not diminishing the burst of packets and the overall throughput of the network. As future work, CRC and HEC metrics are to be added as additional parameters to the proposed scheme so that it can better determine and predict the cause of transmission timeouts in wireless networks. Acknowledgment This research was funded by the Lebanese Association for Computational Sciences (LACSC), Beirut, Lebanon, under the TCP for Wireless Networks Research Project TWNRP2012. References [1] R. Stewart, C. Metz, SCTP: new transport protocol for TCP/IP, IEEE Internet Computing, vol. 5, no. 6, pp , [2] Van Jacobson, and Michael J. Karels, Congestion Avoidance and Control, Proceedings of ACM SIGCOMM '88, pp: , [3] Larry L. Peterson, Bruce S. Davie, Computer Networks, A Systems Approach, 5 th ed, Morgan Kaufmann, [4] G. Xylomenos, G.C. Polyzos, P. Mahonen, and M. Saaranen, TCP Performance Issues over Wireless Links, IEEE Communications Magazine, [5] M. Allman, V. Paxson, and W. Stevens, TCP Congestion Control, RFC 2581, [6] Tanenbaum, Wetherall, Computer Networks, 5 th ed, Prentice Hall, [7] Ye Tian, Kai Xu, and Ansari N, TCP in Wireless Environments: Problems and Solutions, IEEE Communications Magazine, vol. 43, no. 3, pp , [8] Bakre, Badrinath, I-TCP: Indirect TCP for Mobile Hosts, In Proceedings of ICDCS 95, [9] Hari Balakrishnan, Srinivasan Seshan, Elan Amir, and Randy H. Katz, Improving TCP/IP Performance over Wireless Networks, Proceedings of the 1st ACM Conference on Mobile Computing and Networking, Berkeley, CA, November [10] K. Brown and S. Singh, M-TCP: TCP for Mobile Cellular Networks, ACM Computer Communications Review, vol. 27, no. 5, pp , [11] Ramakrishnan and Floyd, A Proposal to add Explicit Congestion Notification (ECN) to IP, Internet Draft, January [12] Chunlei Liu, and Jain R., Approaches of Wireless TCP Enhancement and A New Proposal Based on Congestion Coherence, System Sciences, [13] P. Sinha, N. Venkitaraman, R. Sivakumar, and V. Bharghavan, WTCP: A Reliable Transport Protocol for Wireless Wide-Area Networks, ACM Mobicom, Seattle, WA, [14] Saverio Mascolo, Claudio Casetti, Mario Gerla, M. Y. Sanadidi, and Ren Wang, TCP Westwood: Bandwidth Extimation for Enhanced Transport over Wireless Links, ACM Mobicom, [15] Lawrence S. Brakmo, and Larry L. Peterson., TCP Vegas: End to End Congestion Avoidance on a Global Internet, IEEE Journal on selected areas in communications, vol. 13, no. 8, [16] Cheng Peng Fu, and Soung C. Liew, TCP Veno: TCP Enhancement for Transmission over Wireless Access Networks, IEEE Journal on selected areas in communications, vol. 21, no. 2, [17] Wu E.H.-K., and Mei-Zhen Chen, JTCP: Jitter-based TCP for Heterogeneous Wireless Networks, Selected Areas in Communications, IEEE Journal, vol. 22, no. 4, pp , [18] G. R. Wright, and W. R. Stevens, TCP/IP Illustrated, Volume 2 (The Implementation), Addison Wesley, [19] Rafael C. González, Richard Eugene Woods, Digital Image Processing, Prentice Hall, [20] J. Postel, Transmission Control Protocol, RFC 793, September [21] NS-3 network simulator, URL:

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

An Improved TCP Congestion Control Algorithm for Wireless Networks

An Improved TCP Congestion Control Algorithm for Wireless Networks An Improved TCP Congestion Control Algorithm for Wireless Networks Ahmed Khurshid Department of Computer Science University of Illinois at Urbana-Champaign Illinois, USA khurshi1@illinois.edu Md. Humayun

More information

TCP over Wireless Networks

TCP over Wireless Networks TCP over Wireless Networks Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-10/

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of

More information

Congestions and Control Mechanisms n Wired and Wireless Networks

Congestions and Control Mechanisms n Wired and Wireless Networks International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract

More information

TCP/IP Over Lossy Links - TCP SACK without Congestion Control

TCP/IP Over Lossy Links - TCP SACK without Congestion Control Wireless Random Packet Networking, Part II: TCP/IP Over Lossy Links - TCP SACK without Congestion Control Roland Kempter The University of Alberta, June 17 th, 2004 Department of Electrical And Computer

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Performance improvement of TCP over wireless network

Performance improvement of TCP over wireless network Performance improvement of TCP over wireless network Raja singh Computer science Department, SRIT, Jabalpur, M.P.India, rajasinghpatel@gmail.com Brajesh patel Asst. Prof. SRIT,Jabalpur M.P., India, Abstract:

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network

Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Chaoyang University of Technology, Taiwan, ROC. {changb,s9227623}@mail.cyut.edu.tw 2 Department of Computer Science and Information Engineering

Chaoyang University of Technology, Taiwan, ROC. {changb,s9227623}@mail.cyut.edu.tw 2 Department of Computer Science and Information Engineering TCP-Taichung: A RTT-based Predictive Bandwidth Based with Optimal Shrink Factor for TCP Congestion Control in Heterogeneous Wired and Wireless Networks Ben-Jye Chang 1, Shu-Yu Lin 1, and Ying-Hsin Liang

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Linux 2.4 Implementation of Westwood+ TCP with rate-halving: A Performance Evaluation over the Internet

Linux 2.4 Implementation of Westwood+ TCP with rate-halving: A Performance Evaluation over the Internet Linux. Implementation of TCP with rate-halving: A Performance Evaluation over the Internet A. Dell Aera, L. A. Grieco, S. Mascolo Dipartimento di Elettrotecnica ed Elettronica Politecnico di Bari Via Orabona,

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

TCP Over Wireless Network. Jinhua Zhu Jie Xu

TCP Over Wireless Network. Jinhua Zhu Jie Xu TCP Over Wireless Network Jinhua Zhu Jie Xu Overview 1. TCP congestion control scheme 2. ECN scheme 3. Problems with TCP over wireless network 4. ATCP:TCP for mobile ad hoc networks 5. ptcp: a transport

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

TCP/IP In Cellular Networks

TCP/IP In Cellular Networks TCP/IP In Cellular Networks Two Techniques To Improve TCP Performance In Cellular Networks UNC Wireless Networks 790-088 November, 29 2010 John DeArmon M-TCP: TCP for Cellular Networks Improving TCP Performance

More information

SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS

SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS SELECTIVE-TCP FOR WIRED/WIRELESS NETWORKS by Rajashree Paul Bachelor of Technology, University of Kalyani, 2002 PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF

More information

Performance evaluation of TCP connections in ideal and non-ideal network environments

Performance evaluation of TCP connections in ideal and non-ideal network environments Computer Communications 24 2001) 1769±1779 www.elsevier.com/locate/comcom Performance evaluation of TCP connections in ideal and non-ideal network environments Hala ElAarag, Mostafa Bassiouni* School of

More information

Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications

Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications 212 International Conference on Information and Network Technology (ICINT 212) IPCSIT vol. 7 (212) (212) IACSIT Press, Singapore Analyzing Marking Active Queue Management Scheme on TCP Applications G.A.

More information

TCP Westwood for Wireless

TCP Westwood for Wireless TCP Westwood for Wireless מבוא רקע טכני בקרת עומס ב- TCP TCP על קשר אלחוטי שיפור תפוקה עם פרוטוקול TCP Westwood סיכום.1.2.3.4.5 Seminar in Computer Networks and Distributed Systems Hadassah College Spring

More information

TCP PACKET CONTROL FOR WIRELESS NETWORKS

TCP PACKET CONTROL FOR WIRELESS NETWORKS TCP PACKET CONTROL FOR WIRELESS NETWORKS by Wan Gang Zeng B. Sc. in Computer Science, University of Ottawa, 2000 THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

17: Queue Management. Queuing. Mark Handley

17: Queue Management. Queuing. Mark Handley 17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

Energy Efficient Congestion Control Operation in WSNs Adel Gaafar A. Elrahim Electrical Engineering Dept. Red Sea University, Port Sudan, Sudan

Energy Efficient Congestion Control Operation in WSNs Adel Gaafar A. Elrahim Electrical Engineering Dept. Red Sea University, Port Sudan, Sudan Energy Efficient Congestion Control Operation in WSNs Adel Gaafar A. Elrahim Electrical Engineering Dept. Red Sea University, Port Sudan, Sudan Abstract: The development of wireless technologies makes

More information

La couche transport dans l'internet (la suite TCP/IP)

La couche transport dans l'internet (la suite TCP/IP) La couche transport dans l'internet (la suite TCP/IP) C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Cours de C. Pham,

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

High Performance VPN Solutions Over Satellite Networks

High Performance VPN Solutions Over Satellite Networks High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have

More information

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Outline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002

More information

Effect of Packet-Size over Network Performance

Effect of Packet-Size over Network Performance International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and. Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February

More information

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service

More information

FEW would argue that one of TCP s strengths lies in its

FEW would argue that one of TCP s strengths lies in its IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 13, NO. 8, OCTOBER 1995 1465 TCP Vegas: End to End Congestion Avoidance on a Global Internet Lawrence S. Brakmo, Student Member, IEEE, and Larry L.

More information

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection

TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection TCP based Denial-of-Service Attacks to Edge Network: Analysis and Detection V. Anil Kumar 1 and Dorgham Sisalem 2 1 CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India 2 Fraunhofer

More information

A Survey on Improving TCP Performance over Wireless Networks

A Survey on Improving TCP Performance over Wireless Networks A Survey on Improving TCP Performance over Wireless Networks Xiang Chen, Hongqiang Zhai, Jianfeng Wang and Yuguang Fang Dept. of Electrical and Computer Engineering University of Florida, Gainesville,

More information

Improving TCP/IP Performance over Wireless Networks 1

Improving TCP/IP Performance over Wireless Networks 1 In Proc. 1st ACM Int l Conf. on Mobile Computing and Networking (Mobicom), November 95. This paper won the best student paper award. Improving TCP/IP Performance over Wireless Networks 1 Hari Balakrishnan,

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Split TCP for Mobile Ad Hoc Networks

Split TCP for Mobile Ad Hoc Networks 1 Split TCP for Mobile Ad Hoc Networks Swastik Kopparty, Srikanth V. Krishnamurthy, Michalis Faloutsos, Satish K. Tripathi Department of Computer Science and Engineering, University of California, Riverside,

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

An Improvement Mechanism for Low Priority Traffic TCP Performance in Strict Priority Queueing

An Improvement Mechanism for Low Priority Traffic TCP Performance in Strict Priority Queueing An Improvement Mechanism for Low Priority Traffic TCP Performance in Strict Priority Queueing Mahdi Rahimi and Vahab Pournaghshband Advanced Network and Security Research Laboratory Computer Science Department

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network V. Anil Kumar 1 and Dorgham Sisalem 2 (anil@cmmacs.ernet.in, sisalem@fokus.fhg.de) 1 CSIR Centre

More information

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The

More information

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP

More information

TCP in Wireless Environments: Problems and Solutions

TCP in Wireless Environments: Problems and Solutions TCP in Wireless Environments: Problems and Solutions YE TIAN, KAI XU, AND NIRWAN ANSARI Abstract The Internet provides a platform for rapid and timely information exchange among a disparate array of clients

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks

Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks Wei Wei 1, Chun Zhang 1, Hui Zang 2, Jim Kurose 1, and Don Towsley 1 1 Department of Computer Science, University of Massachusetts,

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

Performance Enhancement of Transmission Control Protocol over Wireless Ad-hoc Networks

Performance Enhancement of Transmission Control Protocol over Wireless Ad-hoc Networks Performance Enhancement of Transmission Control Protocol over Wireless Ad-hoc Networks Salah Zaher Lecturer at Modern Academy in Maadi For Computer Science and Management Technology, Computer Science Dept.,

More information

How To Write A Transport Layer Protocol For Wireless Networks

How To Write A Transport Layer Protocol For Wireless Networks Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security

More information

IMPROVING CONGESTION CONTROL FOR END- TO END DELIVERY IN WIRELESS NETWORKS

IMPROVING CONGESTION CONTROL FOR END- TO END DELIVERY IN WIRELESS NETWORKS IMPROVING CONGESTION CONTROL FOR END- TO END DELIVERY IN WIRELESS NETWORKS Satishkumar D. Prajapati 1, Dhaval J. Varia 2 1 PG Student, 2 Assistant Professor, Computer Science and Engineering Government

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

THE Transmission Control Protocol (TCP) has proved

THE Transmission Control Protocol (TCP) has proved IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 3, NO. 2, APRIL-JUNE 2004 1 Bandwidth Estimation Schemes for TCP over Wireless Networks Antonio Capone, Member, IEEE, Luigi Fratta, Fellow, IEEE, and Fabio Martignon,

More information

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)

More information

A Qos SCHEME TO ADDRESS COMMUNICATION LATENCY ISSUES FOR CRITICAL NETWORK FLOWS IN BEST-EFFORT NETWORKS USING MOBILE AGENTS

A Qos SCHEME TO ADDRESS COMMUNICATION LATENCY ISSUES FOR CRITICAL NETWORK FLOWS IN BEST-EFFORT NETWORKS USING MOBILE AGENTS A Qos SCHEME TO ADDRESS COMMUNICATION LATENCY ISSUES FOR CRITICAL NETWORK FLOWS IN BEST-EFFORT NETWORKS USING MOBILE AGENTS Visvasuresh Victor * Gergely Zaruba G. Balasekaran Govindaswamy University of

More information

A Congestion Control Algorithm for Data Center Area Communications

A Congestion Control Algorithm for Data Center Area Communications A Congestion Control Algorithm for Data Center Area Communications Hideyuki Shimonishi, Junichi Higuchi, Takashi Yoshikawa, and Atsushi Iwata System Platforms Research Laboratories, NEC Corporation 1753

More information

XCP-i : explicit Control Protocol for heterogeneous inter-networking of high-speed networks

XCP-i : explicit Control Protocol for heterogeneous inter-networking of high-speed networks : explicit Control Protocol for heterogeneous inter-networking of high-speed networks D. M. Lopez-Pacheco INRIA RESO/LIP, France Email: dmlopezp@ens-lyon.fr C. Pham, Member, IEEE LIUPPA, University of

More information

Reliable Adaptive Lightweight Multicast Protocol

Reliable Adaptive Lightweight Multicast Protocol Reliable Adaptive Lightweight Multicast Protocol Ken Tang Scalable Network Technologies ktang@scalable-networks.com Katia Obraczka UC Santa Cruz katia@cse.ucsc.edu Sung-Ju Lee HP Labs sjlee@hpl.hp.com

More information

Performance improvement of active queue management with per-flow scheduling

Performance improvement of active queue management with per-flow scheduling Performance improvement of active queue management with per-flow scheduling Masayoshi Nabeshima, Kouji Yata NTT Cyber Solutions Laboratories, NTT Corporation 1-1 Hikari-no-oka Yokosuka-shi Kanagawa 239

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Analysis of TCP Performance Over Asymmetric Wireless Links

Analysis of TCP Performance Over Asymmetric Wireless Links Virginia Tech ECPE 6504: Wireless Networks and Mobile Computing Analysis of TCP Performance Over Asymmetric Kaustubh S. Phanse (kphanse@vt.edu) Outline Project Goal Notions of Asymmetry in Wireless Networks

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Packet Queueing Delay

Packet Queueing Delay Some Active Queue Management Methods for Controlling Packet Queueing Delay Mahmud H. Etbega Mohamed, MSc PhD 2009 Design and Performance Evaluation of Some New Versions of Active Queue Management Schemes

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Network Friendliness of Mobility Management Protocols

Network Friendliness of Mobility Management Protocols Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK

More information

4 High-speed Transmission and Interoperability

4 High-speed Transmission and Interoperability 4 High-speed Transmission and Interoperability Technology 4-1 Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN KUMAZOE Kazumi, KOUYAMA Katsushi, HORI Yoshiaki,

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information